Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 30,714 skills, Security & Compliance has 1088 skills

Categories

Showing 12 of 1088 skills

Per page
Downloads
Sort
Security & Complianceauth0/agent-skills

auth0-mfa

Use when adding multi-factor authentication (MFA/2FA) or requiring additional verification for sensitive operations - covers step-up auth, adaptive MFA, and risk-based authentication with Auth0

🇺🇸|EnglishTranslated
2
Security & Compliancenesnilnehc/ai-cortex

review-security

Review code for security: injection, sensitive data, authentication and authorization, dependencies and CVEs, configuration and secrets, and crypto. Cognitive-only atomic skill; output is a findings list.

🇺🇸|EnglishTranslated
2
Security & Compliancemindrally/skills

security-best-practices

Security best practices for backend development, microservices, and secure coding patterns with emphasis on input validation and authentication

🇺🇸|EnglishTranslated
2
Security & Compliancewrsmith108/varlock-claude...

varlock

Secure environment variable management with Varlock. Use when handling secrets, API keys, credentials, or any sensitive configuration. Ensures secrets are never exposed in terminals, logs, traces, or Claude's context. Trigger phrases include "environment variables", "secrets", ".env", "API key", "credentials", "sensitive", "Varlock".

🇺🇸|EnglishTranslated
2
Security & Complianceshantoislamdev/skills

deep-audit

Universal security and robustness scanner for any codebase. Use when auditing code for vulnerabilities, security issues, bugs, or robustness problems. Automatically detects tech stack, creates custom audit plans, and performs recursive deep analysis.

🇺🇸|EnglishTranslated
2
Security & Compliancemadsnorgaard/agent-resour...

drupal-security

Drupal security expertise. Auto-activates when writing forms, controllers, queries, or handling user input. Prevents XSS, SQL injection, and access bypass vulnerabilities.

🇺🇸|EnglishTranslated
2
Security & Complianceramzxy/ctf

ctf-malware

Malware and network analysis techniques for CTF challenges. Use when analyzing obfuscated scripts, malicious packages, custom protocols, or C2 traffic.

🇺🇸|EnglishTranslated
2
Security & Complianceth3w1zard1/reverse-engine...

deep-analysis

Performs focused, depth-first investigation of specific reverse engineering questions through iterative analysis and database improvement. Answers questions like "What does this function do?", "Does this use crypto?", "What's the C2 address?", "Fix types in this function". Makes incremental improvements (renaming, retyping, commenting) to aid understanding. Returns evidence-based answers with new investigation threads. Use after binary-triage for investigating specific suspicious areas or when user asks focused questions about binary behavior.

🇺🇸|EnglishTranslated
2
Security & Compliancesickn33/antigravity-aweso...

security-compliance-compliance-check

You are a compliance expert specializing in regulatory requirements for software systems including GDPR, HIPAA, SOC2, PCI-DSS, and other industry standards. Perform compliance audits and provide implementation guidance.

🇺🇸|EnglishTranslated
2
Security & Compliancescientiacapital/skills

security

Application security patterns - authentication, secrets management, input validation, OWASP Top 10. Use when: auth, JWT, secrets, API keys, SQL injection, XSS, CSRF, RLS, security audit, pen testing basics.

🇺🇸|EnglishTranslated
2
Security & Compliancetenequm/claude-plugins

solana-security

Audit Solana programs (Anchor or native Rust) for security vulnerabilities. Use when reviewing smart contract security, finding exploits, analyzing attack vectors, performing security assessments, or when explicitly asked to audit, review security, check for bugs, or find vulnerabilities in Solana programs.

🇺🇸|EnglishTranslated
2
Security & Complianceopenharmonyinsight/openha...

openharmony-security-review

Use when reviewing OpenHarmony C++ system service code for security vulnerabilities, particularly IPC handlers, multithreaded components, or code handling sensitive user data

🇺🇸|EnglishTranslated
2
1...2425262728...91
Page